Frank Eliassen

Frank Eliassen
University of Oslo · Department of Informatics

About

181
Publications
23,958
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,943
Citations
Introduction
Additional affiliations
April 2001 - May 2005
Simula Research Laboratory
Position
  • Research Director
April 1994 - June 1998
UiT The Arctic University of Norway
Position
  • Professor (Full)
June 1988 - present
University of Oslo
Position
  • Professor (Full)

Publications

Publications (181)
Article
Full-text available
The growing number of data centers consumes a vast amount of energy for processing. There is a desire to reduce the environmental footprint of the IT industry, and one way to achieve this is to use renewable energy sources. A challenge with using renewable resources is that the energy output is irregular as a consequence of the intermittent nature...
Article
Running computer vision applications, such as 3-D simultaneous localization and mapping (SLAM), on mobile devices requires low-latency responses and a massive amount of computation. Edge computing has been introduced to move Cloud features closer to end users, providing necessary computing and network resources for end devices. The heterogeneous ed...
Article
In smart grids, the large-scale integration of distributed renewable energy resources has enabled the provisioning of alternative sources of supply. Peer-to-peer (P2P) energy trading among local households is becoming an emerging technique that benefits both energy prosumers and operators. Since conventional energy supply is still needed to help fi...
Article
Full-text available
Contemporary energy research is becoming more interdisciplinary through the involvement of technical, economic, and social aspects that must be addressed simultaneously. Within such interdisciplinary energy research, the novel domain of energy informatics plays an important role, as it involves different disciplines addressing the socio-techno-econ...
Conference Paper
Full-text available
Non-intrusive load monitoring (NILM) objective is to disaggregate the total power consumption of a building into individual appliance-level profiles. This gives insights to consumers to efficiently use energy and realizes smart grid efficiency outcomes. While many studies focus on achieving accurate models, few of them address the models generaliza...
Article
Many Internet of Things (IoT) networks are created as an overlay over traditional ad-hoc networks such as Zigbee. Moreover, IoT networks can resemble ad-hoc networks over networks that support device-to-device (D2D) communication, e.g. D2D-enabled cellular networks and WiFi-Direct. In these ad-hoc types of IoT networks, efficient topology managemen...
Chapter
Fog computing plays a crucial role in future smart city applications, enabling services running along the cloud-to-thing continuum with low latency and high quality of service (QoS) requirements. However, the mobility of end users in smart city systems can result in considerable network performance and QoS degradation, hence interrupting fog servic...
Preprint
Full-text available
With the exploitation of wind power, more turbines will be deployed at remote areas possibly with harsh working conditions (e.g., offshore wind farm). The adverse working environment may lead to massive operating and maintenance costs of turbines. Deploying unmanned aerial vehicles (UAVs) for turbine inspection is considered as a viable alternative...
Article
Uncoordinated charging of a rapidly growing number of electric vehicles (EVs) and the uncertainty associated with renewable energy resources may constitute a critical issue for the electric mobility (E-Mobility) in the transportation system especially during peak hours. To overcome this dire scenario, we introduce a stochastic game to study the com...
Article
The power consumption of households has been constantly growing over the years. To cope with this growth, intelligent management of the consumption profile of the households is necessary, such that the households can save the electricity bills, and the stress to the power grid during peak hours can be reduced. However, implementing such a method is...
Preprint
Full-text available
Uncoordinated charging of a rapidly growing number of electric vehicles (EVs) and the uncertainty associated with renewable energy resources may constitute a critical issue for the electric mobility (E-Mobility) in the transportation system especially during peak hours. To overcome this dire scenario, we introduce a stochastic game to study the com...
Preprint
Full-text available
The power consumption of households has been constantly growing over the years. To cope with this growth, intelligent management of the consumption profile of the households is necessary, such that the households can save the electricity bills, and the stress to the power grid during peak hours can be reduced. However, implementing such a method is...
Article
Full-text available
Wind power is a clean and widely deployed alternative to reducing our dependence on fossil fuel power generation. Under this trend, more turbines will be installed in wind farms. However, the inspection of the turbines in an offshore wind farm is a challenging task because of the harsh environment (e.g., rough sea, strong wind, and so on) that lead...
Preprint
Full-text available
Wind power is a clean and widely deployed alternative to reducing our dependence on fossil fuel power generation. Under this trend, more turbines will be installed in wind farms. However, the inspection of the turbines in an offshore wind farm is a challenging task because of the harsh environment (e.g., rough sea, strong wind, and so on) that lead...
Article
Full-text available
Wireless Sensor Networks (WSNs) typically include thousands of resource-constrained sensors to monitor their surroundings, collect information and transfer data to remote machines for further processing. Although WSNs are considered highly flexible ad-hoc networks, network management has been among fundamental challenges to address in these types o...
Conference Paper
With the rapid evolution of the Internet of Things (IoT) and the growth of IoT-generated data, cloud computing platforms have been widely used to store and process this type of data. However, cloud computing cannot handle rapidly emerging smart applications with latency-sensitive, high throughput, and high availability and reliability requirements,...
Article
Full-text available
Proximity Service (ProSe), using the geographic location and device information by considering the proximity of mobile devices, enriches the services we use to interact with people and things around us. ProSe has been used in mobile social networks in proximity (MSNP), and also in smart home and building automation (Google Home). To enable ProSe in...
Article
The convergence of Internet of Things (IoT) and the Cloud has significantly facilitated the provision and management of services in large-scale applications, such as smart cities. With a huge number of IoT services accessible through clouds, it is very important to model and expose cloud-based IoT services in an efficient manner, promising easy and...
Article
A number of emerging multimedia applications, such as webinars, require users to interact by exchanging media streams. In such application there are multiple interacting participants which both produce and consume media content and a set of participants which are only consumers. Keeping the end-to-end latency as low as possible while not violating...
Conference Paper
Fog computing is mainly proposed for IoT applications that are geospatially distributed, large-scale, and latency sensitive. This poses new research challenges in real-time and scalable provisioning of IoT services distributed across Fog-Cloud computing platforms. Data-centric IoT services, as a dominant type of IoT services in large-scale deployme...
Conference Paper
The large-scale deployments of Internet of Things (IoT) systems have introduced several new challenges in terms of processing their data. The massive amount of IoT-generated data requires design solutions to speed up data processing, scale up with the data volume and improve data adaptability and extensibility. Beyond existing techniques for IoT da...
Conference Paper
In battery-powered Cognitive Machine-to-Machine Communications (CM2M), the energy consumption, opportunis-tic data access capacity and interference to the licensed system need to be optimized simultaneously. We consider this as joint cooperative spectrum sensing and power allocation, and model this as a constraint multiobjective optimization proble...
Article
Full-text available
The modern battlefield scenario presents a number of challenges that highlights the importance of data gathering and information flow as crucial to the success of a military operation. In this context, network-centric warfare systems play an important role to bridge the gap between data and information sources and consumers. These systems are gener...
Technical Report
Full-text available
To economically monitor the primary spectrum usage in the urban area scenario, an optimal density deployment of collaborating battery-powered sensors are deployed to carry cooperative spectrum sensing. These sensors consume energy for spectrum sensing and therefore deplete their lifetime , thus we study the key issue in minimizing the sensing energ...
Article
The applications of Cyber-Physical Systems (CPSs) in large scale, mobile and distributed systems, such as transportation and healthcare systems, foster the development of novel cross-CPS applications. Services, in such applications, enable the emergence of multiple end-to-end cyber-physical scenarios, formed dynamically based on their demands, e.g....
Article
Data acquisition is an important task to provide context awareness of a military operation scenario in order to support informed decisions. Wireless sensor networks (WSN) play a remarkable service in this context by collecting data on remote areas to support decision support systems in control centers. However, due to the nature of the locations wh...
Conference Paper
The capabilities of Cyber-Physical Systems (CPSs) are increasingly being extended towards new composite services deployed across a range of smart sensing and controlling devices. These services enable the emergence of multiple end-to-end cyber-physical scenarios, formed dynamically based on their demands, e.g., disaster recovery systems. In such sc...
Article
Nowadays, the computational devices are everywhere. In malls, offices, streets, cars, and even homes, we can find devices providing and consuming functionality to improve the user satisfaction. These devices include sensors that provide information about the environment state (e.g., temperature, occupancy, light levels), service providers (e.g., In...
Article
Full-text available
Adaptation is an increasingly important requirement for software systems executing in large-scale, heterogeneous, and dynamic environments. A central aspect of the adaptation methodology is management of contextual information needed to support the adaptation process. A major design challenge of managing contextual data lies in the fact that the in...
Conference Paper
The challenge of designing and programming Wireless Sensor Network (WSN) applications has gained increasing attention in recent years. While most existing programming models for WSNs share the same goal of improving software modularity, there exists a gap between the structural software design patterns offered by them and the high-level description...
Conference Paper
This paper presents a simulation tool integration framework which aims to integrate tools from various research fields in order to provide a seamless design flow for distributed systems with Emergent Self-Organization (ESO). ESO is a decentralized dynamic process with many favorable properties which makes it attractive for large scale distributed s...
Conference Paper
Full-text available
Adaptation is an increasingly important requirement for software systems executing in large-scale, heterogeneous, and dynamic environments. A central aspect of the adaptation methodology is management of contextual information needed to support the adaptation process. A major design challenge of managing contextual data lies in the fact that the in...
Article
Full-text available
Wireless reprogramming of sensor nodes is a critical requirement in long-lived wireless sensor networks (WSNs) addressing several concerns, such as fixing bugs, upgrading the operating system and applications, and adapting applications behavior according to the physical environment. In such resource-poor platforms, the ability to efficiently delimi...
Article
Today software is the main enabler of many of the appliances and devices omnipresent in our daily life and important for our well being and work satisfaction. It is expected that the software works as intended, and that the software always and everywhere provides us with the best possible utility. This paper discusses the motivation, technical appr...
Article
Full-text available
The (future) Internet of Things (IoT), with service composition point of view, raises additional challenges especially with respect to handling the scale, dynamicity and heterogeneity of the target networking environment. Therefore, the services offered by IoT resources can not be composed by simply extending existing Service Oriented Architecture...
Conference Paper
Nowadays, a range of applications and systems are emerging that consist of hundreds or thousands of computing devices, which are available at low cost but severely limited in their resources. A proper orchestration of these elements can yield a powerful system, which performs complex tasks, while staying simple and making efficient use of its resou...
Article
Full-text available
Wireless sensor networks (WSNs) are being extensively deployed today in various monitoring and control applications by enabling rapid deployments at low cost and with high flexibility. However, high-level software development is still one of the major challenges to wide-spread WSN adoption. The success of high-level programming approaches in WSNs i...
Article
Full-text available
The use of resource-constrained devices, such as smartphones, PDAs, Tablet PCs, and Wireless Sensor Networks (WSNs) is spreading rapidly in the business community and our daily life. Accessing services from such devices is very common in ubiquitous environments, but mechanisms to describe, implement and distribute these services remain a major chal...
Conference Paper
Full-text available
Dealing with a high churn rate is very challenging in live peer-to-peer streaming. State-of-the-art studies try to mitigate the problem by exploiting peer dynamic models, analyzing traces from real world systems, or using enhanced coding techniques, e.g., network coding. However, the origin of the problem — the interest of users in the streaming...
Conference Paper
Full-text available
With the standardization of SVC, the scalable extension of H.264/AVC, layered peer-to-peer streaming has attracted more and more attention as it offers adaptability to network fluctuations and heterogeneous end users. Although overlay construction is important for system performance, not much effort has been spent on unstructured overlay constructi...
Article
The growing complexity, scale and heterogeneity of software systems boosted a great deal of research in the field of self-management and self-adaptation. In general, current solutions are built as fixed frameworks, with rigid methodology, models and tools that are best suited for their target application domain but can not be easily applied in diff...
Chapter
Full-text available
The use of resource-constrained devices, such as smartphones, PDAs, Tablet PCs, and Wireless Sensor Networks (WSNs) is spreading rapidly in the business community and our daily life. Accessing services from such devices is very common in ubiquitous environments, but mechanisms to describe, implement and distribute these services remain a major chal...
Chapter
One of the recent trends in networking has been concentrated on realizing all-IP mobile networks, together with new Internet applications and services. For the next generation of all-IP mobile networks, one of the challenging issues is mobility management. The contribution of this chapter is multifold. First, the state of the art in mobility manage...
Article
Full-text available
The increasing number of distributed applications over Wireless Sensor Networks (WSNs) in ubiquitous environments raises the need for high-level mechanisms to distribute sensor services and integrate them in modern IT systems. Existing work in this area mostly focuses on low-level networking issues, and fails to provide high-level and off-the-shelf...
Article
Full-text available
In ubiquitous environments, resources limitations and fluctuations combined with device mobility requires the dynamic adaptation of mobile applications. This paper reports on an extension of the MUSIC adaptation middleware to support aspect-oriented programming in order to handle cross-cutting adaptations. Basically, this extension specifies an arc...
Conference Paper
Full-text available
The success of high-level programming models in Wireless Sensor Networks (WSNs) is heavily dependent on factors such as ease of programming, code well-structuring, degree of code reusability, and required software development effort. Component-based programming has been recognized as an effective approach to meet such requirements. Most of componen...
Conference Paper
Full-text available
More and more home devices are equipped with advanced computational capabilities to improve the user satisfaction (e.g., programmable heating system, Internet TV). Although these devices exhibit communication capabilities, their integration into a larger home monitoring system remains a challenging task, partly due to the strong heterogeneity of te...
Conference Paper
Full-text available
Layered streaming is being considered as the most promising approach to adapt to bandwidth variations and heterogeneous end users in streaming applications. The goal of a layered streaming protocol is not only to optimize the average playback skip rate as in single-layer streaming, but also to maximize possible quality level (quality satisfaction)...
Conference Paper
Full-text available
In a sensor-aided cognitive radio network, collaborating battery-powered sensors are deployed to aid the network in cooperative spectrum sensing. These sensors consume energy for spectrum sensing and therefore deplete their life-time, thus we study the key issue in minimizing the sensing energy consumed by such group of collaborating sensors. The I...
Conference Paper
Full-text available
Layered streaming can be used to adapt to the available download capacity of an end-user, and such adaptation is very much required in real world HTTP media streaming. The multiple layer codec has become more refined, as SVC (the scalable extension of the H.264/AVC standard) has been standardized with a bit rate overhead of around 10% and an indist...
Conference Paper
Full-text available
Next-generation sensor applications require system software and middleware that can be dynamically adapted to meet resource constraints on sensor nodes, as well as application-specific requirements. The reflective middleware model has emerged as a de facto standard to attain inspection and adaptation in dynamic software systems. However, prior refl...
Chapter
Innovation is one of the three pillars of Simula Research Laboratory. In particular, the subsidiary Simula Innovation is dedicated to identifying research results with commercial potential and assisting the researchers in their initial steps towards business creation. However, history shows that the routes taken from the initial idea to an up-and-r...
Article
Current pervasive systems tend to consider security and QoS separately, ignoring the influence of each aspect on the other. This paper presents an adaptation model based on selection of component compositions enabling to capture dynamic and fine-grained trade-offs between both QoS and security in those systems. The model is multi-constraints and ut...